By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent.

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Organizations may from time to time employ personnel on a contractual or temporary basis to assist in various projects. This may require the temporary employee to utilize company computer equipment to perform their jobs. All temporary personnel that will be using the organization's computer equipment to perform their job function must become familiar with the organization's computer security policy. The network administrator must also perform the following additional security measure:

Create a new account for the temporary employee. This account must have the hours of log on and log off. Do not use the guest account.

Include an expiration date for each temporary account. In most cases this is the date on which the employment contract expires. You can alter the date in the event that the temporary employee needs to stay on.

Create a group account that will include only temporary personnel. Apply necessary log-on scripts. For example, there may be a standard log-on script for permanent employees that may not apply to the temporary user.

Be aware that when a new user is created, he/she automatically becomes a member of the group "everyone." To prevent the temporary user from accessing certain folders that the group "everyone" has access to, apply the temporary group account to these folders.

Limit access to network browsing.

Email access with SMTP addresses should be prevented, because company information can easily be sent to unauthorized sources. However you may be required to assign a SMTP email address, and if so, you should periodically submit reports on mail-server communication logs located in most firewall software to track any communication that may be a threat to the company.

Adesh Rampat has 10 years experience with network and IT administration. He is a member of the Association of Internet Professionals, the Institute for Network Professionals, and the International Webmasters Association. He has also lectured extensively on a variety of topics.

Did you like this tip? If so, (or if not) why not let us know. Send an email to us and sound off. Or visit our tips page to rate this tip, or submit one of your own.

Related book

Principles of Systems and Network Administration Author : Mark Burgess Publisher : John Wiley & Sons Published : Aug 2000 Summary : System administration is the organization and running of computer networks. This book focuses on the general principles involved in setting up configuring and maintaining computer communities.

0 comments

Register

Login

Forgot your password?

Your password has been sent to:

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy